This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Regulatory compliance and dataprivacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style dataprivacy laws came to the U.S. Location Matters.
TrustArc has been named the winner of Cyber Defense Magazine’s (CDM) Global InfoSec Award in the “Cutting Edge in Privacy Management Software” category. CDM, the leading cybersecurity-industry publication, announced the win during its 9th Annual RSA Conference.
They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.
October is Cybersecurity Awareness Month , formerly known as National Cybersecurity Awareness Month. The idea is to raise awareness about cybersecurity, and provide resources for people to feel safer and more secure online. Share”, and “Cybersecurity First”. Experience. The questions is, is anybody listening?
In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Bill Bowman, CISSP, CIPM, is the Chief Information Security Officer & DataPrivacy Officer at financial software company Emburse. I learned from them.
January 28th is DataPrivacy Day, an international effort to empower individuals and support businesses in the endeavor to respect privacy, safeguard data, and enable trust. This year, the National Cybersecurity Alliance has extended the dataprivacy campaign to be a week-long initiative.
Now, those insurers are poised to drive cybersecurity investment by insisting that organizations meet certain criteria to qualify for coverage. Still unclear is whether this will serve the cybersecurity community well, or distort strategies to protect data and networks. A maturing model. billion in premium.
In this episode, host Tom Eston shares the three key lessons he’s learned over his 18-year career in cybersecurity: effective communication, continuous learning, and empathy. The post The Three Keys to Success in Cybersecurity appeared first on Security Boulevard.
One of the big questions that I often get is: How does someone become successful in a cybersecurity career? In this blog I want to share with you the three key lessons I’ve learned during my 18-year journey in the cybersecurity industry.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Well, information security, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives.
The New York State Department of Financial Services (NYDFS) is proposing an amendment to its regulations that will require financial services companies to up their cybersecurity game. Designate a qualified individual (CISO or equivalent) responsible or overseeing and implementing a cybersecurity program and enforcing its cybersecurity policy.
The conversation moves to the ubiquity of AI and machine learning buzzwords at the […] The post Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools appeared first on Shared Security Podcast.
In this exciting episode of our podcast we have the pleasure of speaking with Phillip Wylie, a remarkable professional with a captivating career in cybersecurity. Join us as we discuss Phillip’s unique journey and uncover valuable insights on breaking into the cybersecurity field.
The post USENIX Enigma 2022 – Reza Shokri’s ‘Auditing DataPrivacy For Machine Learning’ appeared first on Security Boulevard. Our sincere thanks to USENIX ENIGMA for publishing their Presenter’s USENIX Enigma Conference 2022 outstanding content on the organization’s’ YouTube channel.
On this episode, Tom Eston discusses empathy in cybersecurity with Andra Zaharia, host of the Cyber Empathy Podcast. We talk about finding her passion for contributing to the industry and the importance of empathy in cybersecurity.
Ask A Stupid Question Day: The Cybersecurity Edition. No matter how long you have worked in the cybersecurity industry, hardly a week goes by without a new acronym appearing in a communication. Here are two of our favorites by Infosec blogger John Oppdenaker on Twitter: My password was hacked. Tue, 09/27/2022 - 05:25.
This week we continue our series on how to break into a cybersecurity career with long time industry veteran, Rob Fuller (Mubix). The post How to Break Into a Cybersecurity Career – Rob Fuller (Mubix) appeared first on The Shared Security Show. Rob also talks about how these experiences has […].
Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail. Plus, details on the recent (ISC)2 bylaw vote (why you should vote no) and a discussion about the value of cybersecurity certifications. ** Links […].
Frost will hang up her uniform in early April after 25 years of service, to which she received an ovation of applause from the greater Charlotte cybersecurity professionals community in attendance. She presented new research that reveals where cybersecurity roles fit in among the economic uncertainty.
The ‘Aware Much’ segment focuses on […] The post Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits appeared first on Shared Security Podcast. The post Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits appeared first on Security Boulevard.
In episode 316, we have the pleasure to chat with Jason Haddix, a prominent influencer in the cybersecurity community. We dive into […] The post Jason Haddix on Bug Bounties and Cybersecurity Career Growth appeared first on Shared Security Podcast.
They exchange insights about their history at Veracode and explore Dan’s journey in cybersecurity. The conversation also covers the state of the cybersecurity […] The post Deepfakes, AI, and the Future of Cybersecurity: Insights from Dan DeCloss of PlexTrac appeared first on Shared Security Podcast.
Learn how her new book goes deeper into secure coding practices, backed by her [] The post Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book appeared first on Shared Security Podcast. The post Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book appeared first on Security Boulevard.
Do you know where your most sensitive data is? Hopefully, your infosec management team is sleeping peacefully at this hour because your. The post Data Classification Policy: Definition, Examples, & Free Template appeared first on Hyperproof. It was originally published in November, 2020.
Thales and Imperva Win Big in 2024 madhav Fri, 12/13/2024 - 08:36 At Thales and Imperva, we are driven by our commitment to make the world safer, and nothing brings us more satisfaction than protecting our customers from daily cybersecurity threats. But that doesnt mean we dont appreciate winning the occasional award.
Related Stories Spotlight: Is There A Cure For InfoSec’s Headcount Headache? Himes on Congress’s About-face on Cybersecurity Episode 226: The Cyber Consequences Of Our Throw Away Culture. The post Spotlight: When Ransomware Comes Calling appeared first on The. Read the whole entry. » Episode 222: US Rep.
Katie Teitler, Senior Cybersecurity Strategist at Axonius and co-host on the popular Enterprise Security Weekly podcast, joins us to discuss the role of cybersecurity in combating midterm election disinformation.
Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. From a cybersecurity perspective, the year had more than its share of incidents. DataPrivacy Day with a difference. MORE The EU cybersecurity strategy shaping our digital future. Sign up here.
Thales and Imperva Win Big in 2024 madhav Fri, 12/13/2024 - 09:36 At Thales and Imperva, we are driven by our commitment to make the world safer, and nothing brings us more satisfaction than protecting our customers from daily cybersecurity threats. But that doesnt mean we dont appreciate winning the occasional award.
A new bipartisan privacy bill, the American DataPrivacy and Protection Act, “could” be the first privacy legislation in the US not doomed to fail, a story about why you should delete your location and private data in your car’s navigation system before selling it, and details on Firefox’s new privacy feature called “Total Cookie […].
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of teenage hackers responsible for major breaches.
The post How to Break Into a Cybersecurity Career – Digital Forensics and Incident Response (DFIR) appeared first on The Shared Security Show. The post How to Break Into a Cybersecurity Career – Digital Forensics and Incident Response (DFIR) appeared first on Security Boulevard.
Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. Say it again, I double dare you Anyone familiar with phishing and social engineering will know scammers often use psychological tricks to get victims to divulge personal data. MORE Working in the transportation sector?
And what are our cybersecurity and privacy predictions for 2023? In our last episode of the year, we discuss the year that was 2022. What did we get right? What did we get wrong? Thank you to all of our listeners for a great year! We’re looking forward to bringing you more content, news, tips, […].
The episode further delves into a cybersecurity incident where hackers stole 340,000 social security numbers from a […] The post Linux Backdoor Infection Scare, Massive Social Security Number Heist appeared first on Shared Security Podcast.
» Related Stories Introducing Securepairs.org: Fighting Infosec FUD for the Right to Repair Episode 153: Hacking Anesthesia Machines and Mayors say No to Ransoms Breathe Deeply: DHS warns of Flaw in Hospital Anesthesia Machines. It has to do with our evolving and still immature system of rating (and therefore thinking about) cyber risk.
This episode is part two of a series featuring SquareX, and Jeswin takes a deeper look into their cybersecurity solutions. In this episode, Tom Eston hosts Jeswin Mathai, Chief Architect at SquareX.
In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. The post Why It’s Time to Leave Twitter appeared first on Security Boulevard.
We also discuss the implications for future technology like AI and potential cybersecurity crises. Plus, in our Aware Much segment, Scott shares tips on protecting your data if your phone is stolen. Join us as we reminisce about Y2K, the panic, the preparations, and the lessons learned 25 years later.
This week we discuss hacking ham radio with special guests Caitlin Johanson, Rick Osgood, and Larry Pesce. In this episode you’ll learn what ham radio is, why its still relevant, why would attackers want to hack ham radio, all about packet radio and APRS (Automatic Packet Reporting System), and what equipment and licensing you need […].
In this episode, we discuss the most sophisticated iPhone exploit ever, Google’s agreement to settle a $5 billion lawsuit about tracking users in ‘incognito’ mode, and a new iOS app, Journal. The iPhone exploit, known as Operation Triangulation, has complex chains of events that lead to compromised iPhone security.
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin.
The DuckDuckGo mobile browser allows Microsoft trackers due to an agreement in their syndicated search content contract, a database of contact details for hundreds of Verizon employees was compromised after an employee was social engineered to give the attacker remote access to their corporate computer, and details about new research that shows that (..)
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content